Articles In Uncategorized

By Gotham, Posted in Uncategorized

From Techopedia: A secure socket layer virtual private network (SSL VPN) allows remote users to access Web applications, client-server applications and internal network connections without having to install specialized client software on their computers. ... read more.

  • October 17, 2012

By Kellye Garrett, Posted in Uncategorized

The first Friday of every month is Gotham Jeans Day, an internal fundraiser for a charity selected from employee suggestions. Past charities have included Avon Walk for Breast Cancer and Operation Smile. On October 5, we raised scholarship money for a child to attend the Day of Studies program at the Red Mountain Therapeutic Riding Center (RMTC) at Kibbutz Grofit in Israel. Located 45 minutes north of Eilat in the southern Arava, RMTC provides horseback riding therapy to 200 children and adults with d... read more.

  • October 15, 2012

By Kellye Garrett, Posted in Uncategorized

Here are some of the technology stories that caught our eye this week: Cyberattacks resumed on more bank websites this week. Information Week reported that the Izz ad-Din al-Qassam Cyber Fighters claimed credit for attacks on sites belonging to Capital One, SunTrust and Regions Financial. Other hackers set their sights on Skype, using the Skype API to remotely take control of infected Windows PCs. According to InfoWorld, the cyber criminals used a variant of the Dorkbot worm. Both HP and Microsoft... read more.

  • October 12, 2012

By Kellye Garrett, Posted in Uncategorized

From the Gartner IT Glossary: A dumb terminal is a terminal that does not perform local processing of entered information, but serves only as an input/output device for an attached or network-linked processor. ... read more.

  • October 10, 2012

By Gotham, Posted in Uncategorized

Application virtualization uncouples applications from host operating systems, dramatically easing deployment and allowing the virtualized application to run in its own isolated sandbox. Application virtualization technology includes Citrix Application Streaming, Microsoft App-V, Symantec EVS, and VMware ThinApp. ... read more.

  • October 03, 2012

By Gotham, Posted in Uncategorized

Application virtualization uncouples applications from host operating systems, dramatically easing deployment and allowing the virtualized application to run in its own isolated sandbox. Application virtualization technology includes Citrix Application Streaming, Microsoft App-V, Symantec EVS, and VMware ThinApp. ... read more.

  • October 03, 2012

By Ed Bratter, Posted in Uncategorized

Being an Exchange guy, I thought it was time to download the beta release of Exchange 2013 to take a look under the covers. I spun up a Windows Server 2012 virtual machine. (What? Did you think I would take the easy way out and install it on Windows 2008?) I fired off the installation program, selected both roles (Mailbox and Client Access), and, like Exchange 2010, made sure the checkbox to install all the required components was selected. The installation program finished and I was on my way. I logged... read more.

  • October 02, 2012

By Gotham, Posted in Uncategorized

From the Microsoft Windows Server 2008 Glossary:  Cluster storage is storage where one or more attached disks hold data used either by server applications running on the cluster or by applications for managing the cluster. Each disk on the cluster storage is owned by only one node of the cluster. The ownership of disks moves from one node to another when the disk group fails over or moves to the other node. ... read more.

  • September 26, 2012

By Gotham, Posted in Uncategorized

From the Microsoft Windows Server 2008 Glossary:  Cluster storage is storage where one or more attached disks hold data used either by server applications running on the cluster or by applications for managing the cluster. Each disk on the cluster storage is owned by only one node of the cluster. The ownership of disks moves from one node to another when the disk group fails over or moves to the other node. ... read more.

  • September 26, 2012

By Gotham, Posted in Uncategorized

From the Citrix Glossary: Authentication is the process of identifying a user, usually based on a user name and password. In security systems, authentication is distinct from authorization, which is the process of giving users access to system objects based on their identity. Authentication confirms the identity of the user but does not impact the access rights of the user. ... read more.

  • September 19, 2012